Think your online information is safe with a password? Think again.

Under newly disclosed documentation obtained under a Freedom of Information Act (FOIA) request, government officials may not always require a search warrant to sift through your most private emails, voice mails or even your most personal Facebook messages.

Generally speaking, it’s also what prohibits law enforcement officials from entering your home without probable cause.

In the case U.S. vs. Warshak, the defendant was never even notified that agents were intercepting his emails.

I want you to pause for just one moment to consider all of the many online transactions you make during your day. Everything, these days, seems to be digitized—emails, bank records, or a writers ramblings and musings—it’s all out there and unguarded against any ‘fishnets’ dropped into the internet waters.

When it comes to our homes, we understand this concept of preserving our reasonable right to privacy. However, when it comes to the ‘zeros and ones’ of all of this internet traffic—most people don’t seem to pay it much attention.

Thankfully, the Federal Appeals Court stood firm in the protection of our Constitutional rights—drawing that very first (and very clear) line in the sand. They ruled that agents violated Mr. Warshak’s Fourth Amendment rights by compelling his Internet Service Provider (ISP) to turn over his emails without first obtaining a search warrant based on probable cause.

And, that should have been the end of things—wouldn’t you think? I mean, if a Federal Court ruling indicates that the matter is settled…

Sadly, this issue is just a wee bit more complicated.

Specifically, a recent update to the FBI’s “Domestic Investigations and Operations Guide” suggests that a potential ‘loophole’ has been granted to federal investigators—making it ‘okay’ to seize data stored on a third party server for more than 180 days.

“[I]f the contents of an unopened message are kept beyond six months or stored on behalf of the customer after the e-mail has been received or opened, it should he treated the same as a business record in the hands of a third party, such as an accountant or attorney. In that case, the government may subpoena the records from the third party without running afoul of either the Fourth or Fifth Amendment.”

Wow, that’s a whole lot of listening going on.

And though, I do fully recognize the need for access to ‘real time’ information gathering to help keep our Nation safe, in our haste are we potentially making matters worse? More access points, even when installed for good measure, invariably lead to more vulnerabilities—and have long been exploited by hackers and others with less than honorable intentions.

Which begs the question, “Are lawmakers solving one problem and creating a much bigger one?”

And though, I’m not so sure how best to handle this digital mess—I’m pretty sure that this isn’t the way to do it.

You know, it used to be that passwords actually meant something—but, I’m not quite sure what to think anymore.

About Tara Lemieux

Tara Lemieux is a mindful wanderer, and faithful stargazer. She is an ardent explorer and lover of finding things previously undiscovered (or, at the very least, mostly not-uncovered.) When she’s not writing, you can find her walking in the woods and sometimes changing the way we look at things, one simple moment at a time. You can contact her at via her website Mindfully Musing
or, take one second to "LIKE" her on Facebook at Tara's Facebook Page. Or email her directly at tara@taralemieux.com. All roads will lead to one home, and rest assured she (and Nudnick, the wonder dog) would LOVE to hear from you.